<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Syslog</title>
    <link>https://blog.corrupted.io/</link>
    <description>Techniker ist informiert.</description>
    <pubDate>Sat, 04 Apr 2026 19:24:35 +0000</pubDate>
    <image>
      <url>https://i.snap.as/ISoU2U3Z.png</url>
      <title>Syslog</title>
      <link>https://blog.corrupted.io/</link>
    </image>
    <item>
      <title>Bad ideas and becoming a warden</title>
      <link>https://blog.corrupted.io/bad-ideas-and-becoming-a-warden?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[I have always been annoyed with the direction game companies have been going and have tried to make VFIO work for me. I’ve had some success but its fiddly so I have been looking to be less fiddly.&#xA;&#xA;!--more--&#xA;&#xA;Looking at the interface around proxmox and how much you can leverage under the hood, since you know its Debian+KVM+LXC with a face and some makeup, I decided to go and fiddle with it to create in essence a jail on this super beefy VFIO box I have. I am going to try and stuff every workstation on it into its own VM, my main systems will have GPUs passed through to it. &#xA;&#xA;What I have in my head right now is the host will have Proxmox. The host will have a NVME disk assigned to it and use ZFS. It is a Ryzen 9 3950x with 64GB of ram 3 NVME disks in it, 2 network interface cards (a 2.5gbps and a 1gbps card) a couple add-on USB controllers, build on an Auorus Master wireless board of some type I forget exactly but it was suited for this task and has isolated IOMMU groups.&#xA;&#xA;Inside the host there will be 2 VMs, &#xA;&#xA;one will be a linux VM with an Intel ARC GPU and USB controller passed through to it. &#xA;The other VM for this test will be a Windows 11 VM with a Nvidia RTX 3060, USB controller, and 1 NVME disks passed through to it.&#xA;&#xA;  There may be other VMs down the line but I want to make the test as simple as I can. There is a bunch of potential here especially for some basic low hanging fruit isolation, yes I know on x86 virtualization isn’t really isolation blah blah blah, and a bit more ability to use this giant beefy box and reconfigure its ability to do what I need on the fly. I will keep some notes and post a lot more about it as I go.&#xA;&#xA;a href=&#34;https://remark.as/p/blog.corrupted.io/bad-ideas-and-becoming-a-warden&#34;Discuss.../a]]&gt;</description>
      <content:encoded><![CDATA[<p>I have always been annoyed with the direction game companies have been going and have tried to make VFIO work for me. I’ve had some success but its fiddly so I have been looking to be less fiddly.</p>



<p>Looking at the interface around proxmox and how much you can leverage under the hood, since you know its Debian+KVM+LXC with a face and some makeup, I decided to go and fiddle with it to create in essence a jail on this super beefy VFIO box I have. I am going to try and stuff every workstation on it into its own VM, my main systems will have GPUs passed through to it.</p>

<p>What I have in my head right now is the host will have Proxmox. The host will have a NVME disk assigned to it and use ZFS. It is a Ryzen 9 3950x with 64GB of ram 3 NVME disks in it, 2 network interface cards (a 2.5gbps and a 1gbps card) a couple add-on USB controllers, build on an Auorus Master wireless board of some type I forget exactly but it was suited for this task and has isolated IOMMU groups.</p>

<p>Inside the host there will be 2 VMs,</p>
<ul><li>one will be a linux VM with an Intel ARC GPU and USB controller passed through to it.</li>
<li>The other VM for this test will be a Windows 11 VM with a Nvidia RTX 3060, USB controller, and 1 NVME disks passed through to it.</li></ul>

<p>  There may be other VMs down the line but I want to make the test as simple as I can. There is a bunch of potential here especially for some basic low hanging fruit isolation, yes I know on x86 virtualization isn’t really isolation blah blah blah, and a bit more ability to use this giant beefy box and reconfigure its ability to do what I need on the fly. I will keep some notes and post a lot more about it as I go.</p>

<p><a href="https://remark.as/p/blog.corrupted.io/bad-ideas-and-becoming-a-warden" rel="nofollow">Discuss...</a></p>
]]></content:encoded>
      <guid>https://blog.corrupted.io/bad-ideas-and-becoming-a-warden</guid>
      <pubDate>Tue, 26 Sep 2023 19:51:24 +0000</pubDate>
    </item>
    <item>
      <title>My ADHD diagnosis</title>
      <link>https://blog.corrupted.io/my-adhd-diagnosis?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[A few months ago shortly after my son I was officially diagnosed. Talking to the doc it made so many things that I did as a kid make sense and made me realize you can be very smart and very ADHD. &#xA;&#xA;!--more--&#xA;&#xA;I remember when I was younger they tried to have my mom get me at least get checked out but she refused because I was “too smart”. In retrospect the struggling that caused was a source of a lot of my anger and over compensation issues. After getting some proper help instead of 100% struggle bus all the time started making me resent my mom over it.&#xA;&#xA;Don’t make people struggle, they may not have words for what is going on. Help mentor and guide people into compensating for their weaknesses, maybe even help them give it a name. Getting diagnosed sooner might not have changed much but it would have made it easier for me to understand and probably would have helped me develop coping strategies sooner instead of being stubborn. The coping strategies are better than anything else long term, and learning them as soon as possible could be life changing. &#xA;&#xA;I plan on helping my son figure out what I figured out the hard way sooner than I did, if he is willing. But I am still mad at my own situation to some degree because it didn’t have to be this way.&#xA;&#xA;a href=&#34;https://remark.as/p/blog.corrupted.io/my-adhd-diagnosis&#34;Discuss.../a]]&gt;</description>
      <content:encoded><![CDATA[<p>A few months ago shortly after my son I was officially diagnosed. Talking to the doc it made so many things that I did as a kid make sense and made me realize you can be very smart and very ADHD.</p>



<p>I remember when I was younger they tried to have my mom get me at least get checked out but she refused because I was “too smart”. In retrospect the struggling that caused was a source of a lot of my anger and over compensation issues. After getting some proper help instead of 100% struggle bus all the time started making me resent my mom over it.</p>

<p>Don’t make people struggle, they may not have words for what is going on. Help mentor and guide people into compensating for their weaknesses, maybe even help them give it a name. Getting diagnosed sooner might not have changed much but it would have made it easier for me to understand and probably would have helped me develop coping strategies sooner instead of being stubborn. The coping strategies are better than anything else long term, and learning them as soon as possible could be life changing.</p>

<p>I plan on helping my son figure out what I figured out the hard way sooner than I did, if he is willing. But I am still mad at my own situation to some degree because it didn’t have to be this way.</p>

<p><a href="https://remark.as/p/blog.corrupted.io/my-adhd-diagnosis" rel="nofollow">Discuss...</a></p>
]]></content:encoded>
      <guid>https://blog.corrupted.io/my-adhd-diagnosis</guid>
      <pubDate>Tue, 11 Jul 2023 16:27:44 +0000</pubDate>
    </item>
    <item>
      <title>Back to Linux</title>
      <link>https://blog.corrupted.io/back-to-linux?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[So I realized I never actually followed back up with my experiment. I gave it a pretty solid college try and did a lot of stuff with WSL and VMs but it just never felt right, always felt that big brother was watching which in the grand scheme of things isn&#39;t wrong but why would they care. But the direction Microsoft was taking with windows to start was eeeehhhh, then Windows 11 came out. Gave that a shot too and realized it wasn&#39;t where I was wanting to follow. I might try living on a Mac for a while because Arm FTW and I got one through a back to school raffle thing and my PC laptop is getting questionable after getting beat around enough, but that will be probably until I get the cash together to get a framework laptop.&#xA;&#xA;In the end my laptop and mobile machine really is just a dumb terminal to write, browse the web, chat, and connect to my much more powerful desktop, so in the end while its critical what it runs is less so as long as I can get VIM, VSCode, SSH, and a decent terminal editor on it.&#xA;&#xA;a href=&#34;https://remark.as/p/blog.corrupted.io/back-to-linux&#34;Discuss.../a]]&gt;</description>
      <content:encoded><![CDATA[<p>So I realized I never actually followed back up with my experiment. I gave it a pretty solid college try and did a lot of stuff with WSL and VMs but it just never felt right, always felt that big brother was watching which in the grand scheme of things isn&#39;t wrong but why would they care. But the direction Microsoft was taking with windows to start was eeeehhhh, then Windows 11 came out. Gave that a shot too and realized it wasn&#39;t where I was wanting to follow. I might try living on a Mac for a while because Arm FTW and I got one through a back to school raffle thing and my PC laptop is getting questionable after getting beat around enough, but that will be probably until I get the cash together to get a framework laptop.</p>

<p>In the end my laptop and mobile machine really is just a dumb terminal to write, browse the web, chat, and connect to my much more powerful desktop, so in the end while its critical what it runs is less so as long as I can get VIM, VSCode, SSH, and a decent terminal editor on it.</p>

<p><a href="https://remark.as/p/blog.corrupted.io/back-to-linux" rel="nofollow">Discuss...</a></p>
]]></content:encoded>
      <guid>https://blog.corrupted.io/back-to-linux</guid>
      <pubDate>Fri, 11 Nov 2022 18:05:58 +0000</pubDate>
    </item>
    <item>
      <title>A Short Experiment</title>
      <link>https://blog.corrupted.io/a-short-experiment?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[Over the past few weeks and months, looking at various roles and jobs, I have had an increasing need to move my mobile machine back to windows !--more--&#xA;&#xA;So for the next few months I am going to move my laptop back to Windows 10 and see if that may just be the way it is for now. Linux has been okay but the numerous little nags and niggles around things like battery regressions and captive portals not working reliably have always annoyed me, and usually at a time they are least convenient. So I think from now until sometime early January I&#39;m going to go whole hog back into Windows and Windows 10 and do it with an open mind. I will try to post about my trials and tribulations with it.&#xA;&#xA;a href=&#34;https://remark.as/p/blog.corrupted.io/a-short-experiment&#34;Discuss.../a]]&gt;</description>
      <content:encoded><![CDATA[<p>Over the past few weeks and months, looking at various roles and jobs, I have had an increasing need to move my mobile machine back to windows </p>

<p>So for the next few months I am going to move my laptop back to Windows 10 and see if that may just be the way it is for now. Linux has been okay but the numerous little nags and niggles around things like battery regressions and captive portals not working reliably have always annoyed me, and usually at a time they are least convenient. So I think from now until sometime early January I&#39;m going to go whole hog back into Windows and Windows 10 and do it with an open mind. I will try to post about my trials and tribulations with it.</p>

<p><a href="https://remark.as/p/blog.corrupted.io/a-short-experiment" rel="nofollow">Discuss...</a></p>
]]></content:encoded>
      <guid>https://blog.corrupted.io/a-short-experiment</guid>
      <pubDate>Mon, 25 Nov 2019 17:24:52 +0000</pubDate>
    </item>
    <item>
      <title>Hostile observability</title>
      <link>https://blog.corrupted.io/hostile-observability?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[In an increasingly connected world we are starting to see more sophisticated attacks being commoditized and sold very similar to how you would buy a word processing suite. Due to this we are seeing a surge in movement toward the removal of trusted networks and apps and an increase in isolation and security domains. While that is a great start I honestly thing we could do better and we should not only avoid trusting anything in the stack we need to have ubiquitous low impact monitoring of every part of the system. !--more--&#xA;&#xA;This post is just a stream of thoughts right now and will contain no wizbang how-tos just my ramblings of why system observability is important.&#xA;&#xA;There is an adage that goes “who watches the watcher” and this is increasingly becoming a larger concern in modern systems as we rely more and more on the operating system to help us isolate everything all we have managed to do is move the trust boundary back instead of eliminate it, and now the OS is the watcher, but how do we know for sure that it is working for us. The answer is for a lot of systems we really don’t even open source systems like Linux are only really now starting to come around to this and due to that you are not seeing it used very much in production yet.&#xA;&#xA;Honestly techs like Dtrace and eBPF are not only miracles for profiling systems they also help us look under hood. With tools like that you can write scripts and live instrumentation and tooling that tell you things like what has been writing to your password file, you can do it in real time and fire alerts off when something unexpected does so as an example. Another example of what you might do with this is plug it into SEIMs that do behavior analysis, so Eve is working on Mallory’s team and is not part of Alice’s skunkworks team, Eve managed to figure out Bob’s password and for some reason now why Bob is on vacation He is logged in from the office and accessing top secret files and changing configuration by hand on a production server outside of Bob and Alice’s configuration management and change control system. The SEIM would pick up the various signals here including the one gleaned from not trusting any part of the system and let your agents know that someone from Eve’s terminal is logged in as Bob and is messing with secrets.&#xA;&#xA;In addition to this if we start watching and logging things like process launches, system file modifications, and other bits of the systems state you can glean things like where a pice of malware came from. What were the first machines, how were they infected, are there any anomalies we can use to spot similar stuff as it happens. As an example of this when Not-Petya came into existence Microsoft was able to use the telemetry it collects into its own black box, which collects a lot of similar info, to find the first machine infected with the malware and was able to develop a detection signature based off the first few things it did. With out this info they would have eventually figured its out by infecting machines and watching them from a controlled environment, but that cycle is getting longer and longer. The various groups that are making fortunes selling commodity malware have wised onto that game and have been trying to detect and lock out researchers.&#xA;&#xA;But to sum this up, we need more observable systems. Stop trusting anything in your environment, or at the very least trust but verify. Collect the data, create alarms and monitoring based on it. If your monitoring misses something add to it. Above all else once you gain this data share as much as your risk profile allows. By working together we can protect ourselves and others, and make the Interconnected world a bit safer.&#xA;&#xA;a href=&#34;https://remark.as/p/blog.corrupted.io/hostile-observability&#34;Discuss.../a]]&gt;</description>
      <content:encoded><![CDATA[<p>In an increasingly connected world we are starting to see more sophisticated attacks being commoditized and sold very similar to how you would buy a word processing suite. Due to this we are seeing a surge in movement toward the removal of trusted networks and apps and an increase in isolation and security domains. While that is a great start I honestly thing we could do better and we should not only avoid trusting anything in the stack we need to have ubiquitous low impact monitoring of every part of the system. </p>

<p>This post is just a stream of thoughts right now and will contain no wizbang how-tos just my ramblings of why system observability is important.</p>

<p>There is an adage that goes “who watches the watcher” and this is increasingly becoming a larger concern in modern systems as we rely more and more on the operating system to help us isolate everything all we have managed to do is move the trust boundary back instead of eliminate it, and now the OS is the watcher, but how do we know for sure that it is working for us. The answer is for a lot of systems we really don’t even open source systems like Linux are only really now starting to come around to this and due to that you are not seeing it used very much in production yet.</p>

<p>Honestly techs like Dtrace and eBPF are not only miracles for profiling systems they also help us look under hood. With tools like that you can write scripts and live instrumentation and tooling that tell you things like what has been writing to your password file, you can do it in real time and fire alerts off when something unexpected does so as an example. Another example of what you might do with this is plug it into SEIMs that do behavior analysis, so Eve is working on Mallory’s team and is not part of Alice’s skunkworks team, Eve managed to figure out Bob’s password and for some reason now why Bob is on vacation He is logged in from the office and accessing top secret files and changing configuration by hand on a production server outside of Bob and Alice’s configuration management and change control system. The SEIM would pick up the various signals here including the one gleaned from not trusting any part of the system and let your agents know that someone from Eve’s terminal is logged in as Bob and is messing with secrets.</p>

<p>In addition to this if we start watching and logging things like process launches, system file modifications, and other bits of the systems state you can glean things like where a pice of malware came from. What were the first machines, how were they infected, are there any anomalies we can use to spot similar stuff as it happens. As an example of this when Not-Petya came into existence Microsoft was able to use the telemetry it collects into its own black box, which collects a lot of similar info, to find the first machine infected with the malware and was able to develop a detection signature based off the first few things it did. With out this info they would have eventually figured its out by infecting machines and watching them from a controlled environment, but that cycle is getting longer and longer. The various groups that are making fortunes selling commodity malware have wised onto that game and have been trying to detect and lock out researchers.</p>

<p>But to sum this up, we need more observable systems. Stop trusting anything in your environment, or at the very least trust but verify. Collect the data, create alarms and monitoring based on it. If your monitoring misses something add to it. Above all else once you gain this data share as much as your risk profile allows. By working together we can protect ourselves and others, and make the Interconnected world a bit safer.</p>

<p><a href="https://remark.as/p/blog.corrupted.io/hostile-observability" rel="nofollow">Discuss...</a></p>
]]></content:encoded>
      <guid>https://blog.corrupted.io/hostile-observability</guid>
      <pubDate>Thu, 14 Nov 2019 17:29:27 +0000</pubDate>
    </item>
    <item>
      <title>Techlog</title>
      <link>https://blog.corrupted.io/techlog?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[This is the initial post for the sneaky.dev domain. There are some things here I will have to pull over but keep your eyes peeled.&#xA;&#xA;The main goal here will be for me to put my stream of technical discoveries and howtos&#xA;&#xA;a href=&#34;https://remark.as/p/blog.corrupted.io/techlog&#34;Discuss.../a]]&gt;</description>
      <content:encoded><![CDATA[<p>This is the initial post for the sneaky.dev domain. There are some things here I will have to pull over but keep your eyes peeled.</p>

<p>The main goal here will be for me to put my stream of technical discoveries and howtos</p>

<p><a href="https://remark.as/p/blog.corrupted.io/techlog" rel="nofollow">Discuss...</a></p>
]]></content:encoded>
      <guid>https://blog.corrupted.io/techlog</guid>
      <pubDate>Wed, 06 Nov 2019 15:11:43 +0000</pubDate>
    </item>
  </channel>
</rss>